Vulnerabilities > CVE-2019-16167 - Integer Overflow or Wraparound vulnerability in multiple products
Attack vector
LOCAL Attack complexity
LOW Privileges required
NONE Confidentiality impact
NONE Integrity impact
NONE Availability impact
HIGH Summary
sysstat before 12.1.6 has memory corruption due to an Integer Overflow in remap_struct() in sa_common.c.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Common Attack Pattern Enumeration and Classification (CAPEC)
- Forced Integer Overflow This attack forces an integer variable to go out of range. The integer variable is often used as an offset such as size of memory allocation or similarly. The attacker would typically control the value of such variable and try to get it out of range. For instance the integer in question is incremented past the maximum possible value, it may wrap to become a very small, or negative number, therefore providing a very incorrect value which can lead to unexpected behavior. At worst the attacker can execute arbitrary code.
Nessus
NASL family SuSE Local Security Checks NASL id SUSE_SU-2019-2752-1.NASL description This update for sysstat fixes the following issue : CVE-2019-16167: Fixed a memory corruption due to an integer overflow. (bsc#1150114) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 130196 published 2019-10-24 reporter This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/130196 title SUSE SLED12 / SLES12 Security Update : sysstat (SUSE-SU-2019:2752-1) code # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from SUSE update advisory SUSE-SU-2019:2752-1. # The text itself is copyright (C) SUSE. # include("compat.inc"); if (description) { script_id(130196); script_version("1.3"); script_cvs_date("Date: 2019/12/18"); script_cve_id("CVE-2019-16167"); script_name(english:"SUSE SLED12 / SLES12 Security Update : sysstat (SUSE-SU-2019:2752-1)"); script_summary(english:"Checks rpm output for the updated packages."); script_set_attribute( attribute:"synopsis", value:"The remote SUSE host is missing one or more security updates." ); script_set_attribute( attribute:"description", value: "This update for sysstat fixes the following issue : CVE-2019-16167: Fixed a memory corruption due to an integer overflow. (bsc#1150114) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues." ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1150114" ); script_set_attribute( attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2019-16167/" ); # https://www.suse.com/support/update/announcement/2019/suse-su-20192752-1/ script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?3de70f61" ); script_set_attribute( attribute:"solution", value: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or 'zypper patch'. Alternatively you can run the command listed for your product : SUSE Linux Enterprise Server 12-SP4:zypper in -t patch SUSE-SLE-SERVER-12-SP4-2019-2752=1 SUSE Linux Enterprise Desktop 12-SP4:zypper in -t patch SUSE-SLE-DESKTOP-12-SP4-2019-2752=1" ); script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"); script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:sysstat"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:sysstat-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:sysstat-debugsource"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:sysstat-isag"); script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:suse_linux:12"); script_set_attribute(attribute:"vuln_publication_date", value:"2019/09/09"); script_set_attribute(attribute:"patch_publication_date", value:"2019/10/23"); script_set_attribute(attribute:"plugin_publication_date", value:"2019/10/24"); script_set_attribute(attribute:"generated_plugin", value:"current"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"SuSE Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/SuSE/release"); if (isnull(release) || release !~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "SUSE"); os_ver = pregmatch(pattern: "^(SLE(S|D)\d+)", string:release); if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "SUSE"); os_ver = os_ver[1]; if (! preg(pattern:"^(SLED12|SLES12)$", string:os_ver)) audit(AUDIT_OS_NOT, "SUSE SLED12 / SLES12", "SUSE " + os_ver); if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if (cpu !~ "^i[3-6]86$" && "x86_64" >!< cpu && "s390x" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "SUSE " + os_ver, cpu); sp = get_kb_item("Host/SuSE/patchlevel"); if (isnull(sp)) sp = "0"; if (os_ver == "SLES12" && (! preg(pattern:"^(4)$", string:sp))) audit(AUDIT_OS_NOT, "SLES12 SP4", os_ver + " SP" + sp); if (os_ver == "SLED12" && (! preg(pattern:"^(4)$", string:sp))) audit(AUDIT_OS_NOT, "SLED12 SP4", os_ver + " SP" + sp); flag = 0; if (rpm_check(release:"SLES12", sp:"4", reference:"sysstat-12.0.2-10.27.1")) flag++; if (rpm_check(release:"SLES12", sp:"4", reference:"sysstat-debuginfo-12.0.2-10.27.1")) flag++; if (rpm_check(release:"SLES12", sp:"4", reference:"sysstat-debugsource-12.0.2-10.27.1")) flag++; if (rpm_check(release:"SLES12", sp:"4", reference:"sysstat-isag-12.0.2-10.27.1")) flag++; if (rpm_check(release:"SLED12", sp:"4", cpu:"x86_64", reference:"sysstat-12.0.2-10.27.1")) flag++; if (rpm_check(release:"SLED12", sp:"4", cpu:"x86_64", reference:"sysstat-debuginfo-12.0.2-10.27.1")) flag++; if (rpm_check(release:"SLED12", sp:"4", cpu:"x86_64", reference:"sysstat-debugsource-12.0.2-10.27.1")) flag++; if (flag) { if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get()); else security_warning(0); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "sysstat"); }
NASL family SuSE Local Security Checks NASL id SUSE_SU-2019-2749-1.NASL description This update for sysstat fixes the following issue : CVE-2019-16167: Fixed a memory corruption due to an integer overflow. (bsc#1150114) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 130194 published 2019-10-24 reporter This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/130194 title SUSE SLED15 / SLES15 Security Update : sysstat (SUSE-SU-2019:2749-1) code # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from SUSE update advisory SUSE-SU-2019:2749-1. # The text itself is copyright (C) SUSE. # include("compat.inc"); if (description) { script_id(130194); script_version("1.3"); script_cvs_date("Date: 2019/12/18"); script_cve_id("CVE-2019-16167"); script_name(english:"SUSE SLED15 / SLES15 Security Update : sysstat (SUSE-SU-2019:2749-1)"); script_summary(english:"Checks rpm output for the updated packages."); script_set_attribute( attribute:"synopsis", value:"The remote SUSE host is missing one or more security updates." ); script_set_attribute( attribute:"description", value: "This update for sysstat fixes the following issue : CVE-2019-16167: Fixed a memory corruption due to an integer overflow. (bsc#1150114) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues." ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1150114" ); script_set_attribute( attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2019-16167/" ); # https://www.suse.com/support/update/announcement/2019/suse-su-20192749-1/ script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?cb9a46d7" ); script_set_attribute( attribute:"solution", value: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or 'zypper patch'. Alternatively you can run the command listed for your product : SUSE Linux Enterprise Module for Server Applications 15-SP1:zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP1-2019-2749=1 SUSE Linux Enterprise Module for Server Applications 15:zypper in -t patch SUSE-SLE-Module-Server-Applications-15-2019-2749=1 SUSE Linux Enterprise Module for Basesystem 15-SP1:zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP1-2019-2749=1 SUSE Linux Enterprise Module for Basesystem 15:zypper in -t patch SUSE-SLE-Module-Basesystem-15-2019-2749=1" ); script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"); script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:sysstat"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:sysstat-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:sysstat-debugsource"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:sysstat-isag"); script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:suse_linux:15"); script_set_attribute(attribute:"vuln_publication_date", value:"2019/09/09"); script_set_attribute(attribute:"patch_publication_date", value:"2019/10/23"); script_set_attribute(attribute:"plugin_publication_date", value:"2019/10/24"); script_set_attribute(attribute:"generated_plugin", value:"current"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"SuSE Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/SuSE/release"); if (isnull(release) || release !~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "SUSE"); os_ver = pregmatch(pattern: "^(SLE(S|D)\d+)", string:release); if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "SUSE"); os_ver = os_ver[1]; if (! preg(pattern:"^(SLED15|SLES15)$", string:os_ver)) audit(AUDIT_OS_NOT, "SUSE SLED15 / SLES15", "SUSE " + os_ver); if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if (cpu !~ "^i[3-6]86$" && "x86_64" >!< cpu && "s390x" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "SUSE " + os_ver, cpu); sp = get_kb_item("Host/SuSE/patchlevel"); if (isnull(sp)) sp = "0"; if (os_ver == "SLES15" && (! preg(pattern:"^(0|1)$", string:sp))) audit(AUDIT_OS_NOT, "SLES15 SP0/1", os_ver + " SP" + sp); if (os_ver == "SLED15" && (! preg(pattern:"^(0|1)$", string:sp))) audit(AUDIT_OS_NOT, "SLED15 SP0/1", os_ver + " SP" + sp); flag = 0; if (rpm_check(release:"SLES15", sp:"1", reference:"sysstat-debuginfo-12.0.2-3.15.1")) flag++; if (rpm_check(release:"SLES15", sp:"1", reference:"sysstat-debugsource-12.0.2-3.15.1")) flag++; if (rpm_check(release:"SLES15", sp:"1", reference:"sysstat-isag-12.0.2-3.15.1")) flag++; if (rpm_check(release:"SLES15", sp:"1", reference:"sysstat-12.0.2-3.15.1")) flag++; if (rpm_check(release:"SLES15", sp:"1", reference:"sysstat-debuginfo-12.0.2-3.15.1")) flag++; if (rpm_check(release:"SLES15", sp:"1", reference:"sysstat-debugsource-12.0.2-3.15.1")) flag++; if (rpm_check(release:"SLES15", sp:"0", reference:"sysstat-debuginfo-12.0.2-3.15.1")) flag++; if (rpm_check(release:"SLES15", sp:"0", reference:"sysstat-debugsource-12.0.2-3.15.1")) flag++; if (rpm_check(release:"SLES15", sp:"0", reference:"sysstat-isag-12.0.2-3.15.1")) flag++; if (rpm_check(release:"SLES15", sp:"0", reference:"sysstat-12.0.2-3.15.1")) flag++; if (rpm_check(release:"SLES15", sp:"0", reference:"sysstat-debuginfo-12.0.2-3.15.1")) flag++; if (rpm_check(release:"SLES15", sp:"0", reference:"sysstat-debugsource-12.0.2-3.15.1")) flag++; if (rpm_check(release:"SLED15", sp:"1", reference:"sysstat-12.0.2-3.15.1")) flag++; if (rpm_check(release:"SLED15", sp:"1", reference:"sysstat-debuginfo-12.0.2-3.15.1")) flag++; if (rpm_check(release:"SLED15", sp:"1", reference:"sysstat-debugsource-12.0.2-3.15.1")) flag++; if (rpm_check(release:"SLED15", sp:"0", reference:"sysstat-12.0.2-3.15.1")) flag++; if (rpm_check(release:"SLED15", sp:"0", reference:"sysstat-debuginfo-12.0.2-3.15.1")) flag++; if (rpm_check(release:"SLED15", sp:"0", reference:"sysstat-debugsource-12.0.2-3.15.1")) flag++; if (flag) { if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get()); else security_warning(0); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "sysstat"); }
NASL family Fedora Local Security Checks NASL id FEDORA_2020-9CED76E631.NASL description Fixes CVE-2019-16167. Many new features and bug fixes. Please test thoroughly. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 133428 published 2020-02-03 reporter This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/133428 title Fedora 31 : sysstat (2020-9ced76e631) code # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Fedora Security Advisory FEDORA-2020-9ced76e631. # include("compat.inc"); if (description) { script_id(133428); script_version("1.2"); script_cvs_date("Date: 2020/02/05"); script_cve_id("CVE-2019-16167"); script_xref(name:"FEDORA", value:"2020-9ced76e631"); script_name(english:"Fedora 31 : sysstat (2020-9ced76e631)"); script_summary(english:"Checks rpm output for the updated package."); script_set_attribute( attribute:"synopsis", value:"The remote Fedora host is missing a security update." ); script_set_attribute( attribute:"description", value: "Fixes CVE-2019-16167. Many new features and bug fixes. Please test thoroughly. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues." ); script_set_attribute( attribute:"see_also", value:"https://bodhi.fedoraproject.org/updates/FEDORA-2020-9ced76e631" ); script_set_attribute( attribute:"solution", value:"Update the affected sysstat package." ); script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"); script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:sysstat"); script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:31"); script_set_attribute(attribute:"vuln_publication_date", value:"2019/09/09"); script_set_attribute(attribute:"patch_publication_date", value:"2020/02/03"); script_set_attribute(attribute:"plugin_publication_date", value:"2020/02/03"); script_set_attribute(attribute:"generated_plugin", value:"current"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Fedora Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/RedHat/release"); if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora"); os_ver = pregmatch(pattern: "Fedora.*release ([0-9]+)", string:release); if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora"); os_ver = os_ver[1]; if (! preg(pattern:"^31([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 31", "Fedora " + os_ver); if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu); flag = 0; if (rpm_check(release:"FC31", reference:"sysstat-12.3.1-1.fc31")) flag++; if (flag) { security_report_v4( port : 0, severity : SECURITY_WARNING, extra : rpm_report_get() ); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "sysstat"); }
NASL family SuSE Local Security Checks NASL id SUSE_SU-2019-2752-2.NASL description This update for sysstat fixes the following issue : CVE-2019-16167: Fixed a memory corruption due to an integer overflow. (bsc#1150114) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 130944 published 2019-11-13 reporter This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/130944 title SUSE SLES12 Security Update : sysstat (SUSE-SU-2019:2752-2) NASL family Huawei Local Security Checks NASL id EULEROS_SA-2020-1067.NASL description According to the version of the sysstat package installed, the EulerOS Virtualization for ARM 64 installation on the remote host is affected by the following vulnerability : - sysstat before 12.1.6 has memory corruption due to an Integer Overflow in remap_struct() in sa_common.c.(CVE-2019-16167) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 132821 published 2020-01-13 reporter This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/132821 title EulerOS Virtualization for ARM 64 3.0.5.0 : sysstat (EulerOS-SA-2020-1067) NASL family PhotonOS Local Security Checks NASL id PHOTONOS_PHSA-2019-2_0-0184_SYSSTAT.NASL description An update of the sysstat package has been released. last seen 2020-06-01 modified 2020-06-02 plugin id 130206 published 2019-10-25 reporter This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/130206 title Photon OS 2.0: Sysstat PHSA-2019-2.0-0184 NASL family SuSE Local Security Checks NASL id OPENSUSE-2019-2395.NASL description This update for sysstat fixes the following issue : - CVE-2019-16167: Fixed a memory corruption due to an integer overflow. (bsc#1150114) This update was imported from the SUSE:SLE-15:Update update project. last seen 2020-06-01 modified 2020-06-02 plugin id 130356 published 2019-10-29 reporter This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/130356 title openSUSE Security Update : sysstat (openSUSE-2019-2395) NASL family SuSE Local Security Checks NASL id OPENSUSE-2019-2397.NASL description This update for sysstat fixes the following issue : - CVE-2019-16167: Fixed a memory corruption due to an integer overflow. (bsc#1150114) This update was imported from the SUSE:SLE-15:Update update project. last seen 2020-06-01 modified 2020-06-02 plugin id 130358 published 2019-10-29 reporter This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/130358 title openSUSE Security Update : sysstat (openSUSE-2019-2397) NASL family Huawei Local Security Checks NASL id EULEROS_SA-2019-2120.NASL description According to the version of the sysstat package installed, the EulerOS installation on the remote host is affected by the following vulnerability : - sysstat before 12.1.6 has memory corruption due to an Integer Overflow in remap_struct() in sa_common.c.(CVE-2019-16167) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-05-03 modified 2019-11-12 plugin id 130829 published 2019-11-12 reporter This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/130829 title EulerOS 2.0 SP8 : sysstat (EulerOS-SA-2019-2120) NASL family Ubuntu Local Security Checks NASL id UBUNTU_USN-4242-1.NASL description It was discovered that Sysstat incorrectly handled certain inputs. An attacker could possibly use this issue to cause a crash or execute arbitrary code. This issue only affected Ubuntu 19.04 and Ubuntu 19.10. (CVE-2019-16167) It was discovered that Sysstat incorrectly handled certain inputs. An attacker could possibly use this issue to execute arbitrary code. (CVE-2019-19725). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 133143 published 2020-01-21 reporter Ubuntu Security Notice (C) 2020 Canonical, Inc. / NASL script (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/133143 title Ubuntu 16.04 LTS / 18.04 LTS / 19.04 / 19.10 : sysstat vulnerabilities (USN-4242-1)
References
- https://github.com/sysstat/sysstat/compare/v12.1.5...v12.1.6
- https://github.com/sysstat/sysstat/issues/230
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00067.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00068.html
- https://usn.ubuntu.com/4242-1/
- https://lists.debian.org/debian-lts-announce/2022/11/msg00014.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RVSMKUPWIGQYX4G5LZXL7ZBJN3KY6RM3/